/* $OpenBSD: ip_ah_new.c,v 1.6 1997/07/27 23:30:34 niklas Exp $ */ /* * The author of this code is John Ioannidis, ji@tla.org, * (except when noted otherwise). * * This code was written for BSD/OS in Athens, Greece, in November 1995. * * Ported to OpenBSD and NetBSD, with additional transforms, in December 1996, * by Angelos D. Keromytis, kermit@forthnet.gr. * * Copyright (C) 1995, 1996, 1997 by John Ioannidis and Angelos D. Keromytis. * * Permission to use, copy, and modify this software without fee * is hereby granted, provided that this entire notice is included in * all copies of any software which is or includes a copy or * modification of this software. * * THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR * IMPLIED WARRANTY. IN PARTICULAR, NEITHER AUTHOR MAKES ANY * REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE * MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR * PURPOSE. */ /* * Based on RFC 2085. */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include extern void encap_sendnotify(int, struct tdb *); /* * ah_new_attach() is called from the transformation initialization code. * It just returns. */ int ah_new_attach() { #ifdef ENCDEBUG if (encdebug) printf("ah_new_attach(): setting up\n"); #endif /* ENCDEBUG */ return 0; } /* * ah_new_init() is called when an SPI is being set up. It interprets the * encap_msghdr present in m, and sets up the transformation data. */ int ah_new_init(struct tdb *tdbp, struct xformsw *xsp, struct mbuf *m) { struct ah_new_xdata *xd; struct ah_new_xencap txd; struct encap_msghdr *em; caddr_t buffer = NULL; int blocklen, i; if (m->m_len < ENCAP_MSG_FIXED_LEN) { if ((m = m_pullup(m, ENCAP_MSG_FIXED_LEN)) == NULL) { #ifdef ENCDEBUG if (encdebug) printf("ah_new_init(): m_pullup failed\n"); #endif /* ENCDEBUG */ return ENOBUFS; } } em = mtod(m, struct encap_msghdr *); if (em->em_msglen - EMT_SETSPI_FLEN <= AH_NEW_XENCAP_LEN) { log(LOG_WARNING, "ah_new_init() initialization failed"); return EINVAL; } /* Just copy the standard fields */ m_copydata(m, EMT_SETSPI_FLEN, AH_NEW_XENCAP_LEN, (caddr_t) &txd); /* Check whether the hash algorithm is supposed */ switch (txd.amx_hash_algorithm) { case ALG_AUTH_MD5: case ALG_AUTH_SHA1: #ifdef ENCDEBUG if (encdebug) printf("ah_new_init(): initalized TDB with hash algorithm %d\n", txd.amx_hash_algorithm); #endif /* ENCDEBUG */ blocklen = HMAC_BLOCK_LEN; break; default: log(LOG_WARNING, "ah_new_init(): unsupported authentication algorithm %d specified", txd.amx_hash_algorithm); return EINVAL; } if (txd.amx_keylen + EMT_SETSPI_FLEN + AH_NEW_XENCAP_LEN != em->em_msglen) { log(LOG_WARNING, "ah_new_init(): message length (%d) doesn't match", em->em_msglen); return EINVAL; } MALLOC(tdbp->tdb_xdata, caddr_t, sizeof(struct ah_new_xdata), M_XDATA, M_WAITOK); if (tdbp->tdb_xdata == NULL) { #ifdef ENCDEBUG if (encdebug) printf("ah_new_init(): MALLOC failed\n"); #endif /* ENCDEBUG */ return ENOBUFS; } MALLOC(buffer, caddr_t, (txd.amx_keylen < blocklen ? blocklen : txd.amx_keylen), M_TEMP, M_WAITOK); if (buffer == NULL) { #ifdef ENCDEBUG if (encdebug) printf("ah_new_init(): MALLOC failed\n"); #endif /* ENCDEBUG */ free(tdbp->tdb_xdata, M_XDATA); return ENOBUFS; } bzero(buffer, (txd.amx_keylen < blocklen ? blocklen : txd.amx_keylen)); bzero(tdbp->tdb_xdata, sizeof(struct ah_new_xdata)); xd = (struct ah_new_xdata *) tdbp->tdb_xdata; /* Copy the key to the buffer */ m_copydata(m, EMT_SETSPI_FLEN + AH_NEW_XENCAP_LEN, txd.amx_keylen, buffer); /* Shorten the key if necessary */ if (txd.amx_keylen > blocklen) { switch (txd.amx_hash_algorithm) { case ALG_AUTH_MD5: MD5Init(&(xd->amx_md5_ictx)); MD5Update(&(xd->amx_md5_ictx), buffer, txd.amx_keylen); bzero(buffer, (txd.amx_keylen < blocklen ? blocklen : txd.amx_keylen)); MD5Final(buffer, &(xd->amx_md5_ictx)); break; case ALG_AUTH_SHA1: SHA1Init(&(xd->amx_sha1_ictx)); SHA1Update(&(xd->amx_sha1_ictx), buffer, txd.amx_keylen); bzero(buffer, (txd.amx_keylen < blocklen ? blocklen : txd.amx_keylen)); SHA1Final(buffer, &(xd->amx_sha1_ictx)); break; } } /* Pointer to the transform */ tdbp->tdb_xform = xsp; xd->amx_hash_algorithm = txd.amx_hash_algorithm; xd->amx_rpl = AH_HMAC_INITIAL_RPL; xd->amx_wnd = txd.amx_wnd; xd->amx_bitmap = 0; /* Precompute the I and O pads of the HMAC */ for (i = 0; i < blocklen; i++) buffer[i] ^= HMAC_IPAD_VAL; switch (xd->amx_hash_algorithm) { case ALG_AUTH_MD5: MD5Init(&(xd->amx_md5_ictx)); MD5Update(&(xd->amx_md5_ictx), buffer, blocklen); break; case ALG_AUTH_SHA1: SHA1Init(&(xd->amx_sha1_ictx)); SHA1Update(&(xd->amx_sha1_ictx), buffer, blocklen); break; } for (i = 0; i < blocklen; i++) buffer[i] ^= (HMAC_IPAD_VAL ^ HMAC_OPAD_VAL); switch (xd->amx_hash_algorithm) { case ALG_AUTH_MD5: MD5Init(&(xd->amx_md5_octx)); MD5Update(&(xd->amx_md5_octx), buffer, blocklen); break; case ALG_AUTH_SHA1: SHA1Init(&(xd->amx_sha1_octx)); SHA1Update(&(xd->amx_sha1_octx), buffer, blocklen); break; } bzero(buffer, blocklen); /* paranoid */ free(buffer, M_TEMP); bzero(ipseczeroes, IPSEC_ZEROES_SIZE); /* paranoid */ return 0; } /* Free memory */ int ah_new_zeroize(struct tdb *tdbp) { #ifdef ENCDEBUG if (encdebug) printf("ah_new_zeroize(): freeing memory\n"); #endif /* ENCDEBUG */ FREE(tdbp->tdb_xdata, M_XDATA); return 0; } /* * ah_new_input() gets called to verify that an input packet * passes authentication. */ struct mbuf * ah_new_input(struct mbuf *m, struct tdb *tdb) { struct ah_new_xdata *xd; struct ip *ip, ipo; struct ah_new *aho, *ah; struct ifnet *rcvif; int ohlen, len, count, off, errc; u_int32_t btsx; struct mbuf *m0; MD5_CTX md5ctx; SHA1_CTX sha1ctx; u_int8_t optval; u_char buffer[40]; aho = (struct ah_new *) buffer; xd = (struct ah_new_xdata *) tdb->tdb_xdata; switch (xd->amx_hash_algorithm) { case ALG_AUTH_MD5: case ALG_AUTH_SHA1: break; default: log(LOG_ALERT, "ah_new_input(): unsupported algorithm %d in SA %x/%08x", xd->amx_hash_algorithm, tdb->tdb_dst, ntohl(tdb->tdb_spi)); m_freem(m); return NULL; } ohlen = sizeof(struct ip) + AH_NEW_FLENGTH; rcvif = m->m_pkthdr.rcvif; if (rcvif == NULL) { #ifdef ENCDEBUG if (encdebug) printf("ah_new_input(): receive interface is NULL!!!\n"); #endif /* ENCDEBUG */ rcvif = &enc_softc; } if (m->m_len < ohlen) { if ((m = m_pullup(m, ohlen)) == NULL) { ahstat.ahs_hdrops++; #ifdef ENCDEBUG if (encdebug) printf("ah_new_input(): (possibly too short) packet dropped\n"); #endif /* ENCDEBUG */ return NULL; } } ip = mtod(m, struct ip *); /* Adjust, if options are present */ if ((ip->ip_hl << 2) > sizeof(struct ip)) { if ((m = m_pullup(m, ohlen - sizeof (struct ip) + (ip->ip_hl << 2))) == NULL) { #ifdef ENCDEBUG if (encdebug) printf("ah_new_input(): m_pullup() failed\n"); #endif /* ENCDEBUG */ ahstat.ahs_hdrops++; return NULL; } ip = mtod(m, struct ip *); ah = (struct ah_new *) ((u_int8_t *) ip + (ip->ip_hl << 2)); ohlen += ((ip->ip_hl << 2) - sizeof(struct ip)); } else ah = (struct ah_new *) (ip + 1); if (ah->ah_hl * sizeof(u_int32_t) != AH_HMAC_HASHLEN) { #ifdef ENCDEBUG if (encdebug) printf("ah_new_input(): bad authenticator length for packet from %x to %x, spi %08x\n", ip->ip_src, ip->ip_dst, ntohl(ah->ah_spi)); #endif /* ENCDEBUG */ ahstat.ahs_badauthl++; m_freem(m); return NULL; } /* Replay window checking */ if (xd->amx_wnd >= 0) { btsx = ntohl(ah->ah_rpl); if ((errc = checkreplaywindow32(btsx, 0, &(xd->amx_rpl), xd->amx_wnd, &(xd->amx_bitmap))) != 0) { switch(errc) { case 1: log(LOG_ERR, "ah_new_input(): replay counter wrapped for packets from %x to %x, spi %08x\n", ip->ip_src, ip->ip_dst, ntohl(ah->ah_spi)); ahstat.ahs_wrap++; break; case 2: case 3: log(LOG_WARNING, "ahhmachmd5_input(): duplicate packet received, %x->%x spi %08x", ip->ip_src, ip->ip_dst, ntohl(ah->ah_spi)); ahstat.ahs_replay++; break; } m_freem(m); return NULL; } } ipo = *ip; ipo.ip_tos = 0; ipo.ip_len += (ip->ip_hl << 2); /* adjusted in ip_intr() */ HTONS(ipo.ip_len); HTONS(ipo.ip_id); ipo.ip_off = htons(ipo.ip_off & IP_DF); /* XXX -- and the C bit? */ ipo.ip_ttl = 0; ipo.ip_sum = 0; switch (xd->amx_hash_algorithm) { case ALG_AUTH_MD5: md5ctx = xd->amx_md5_ictx; MD5Update(&md5ctx, (unsigned char *) &ipo, sizeof(struct ip)); break; case ALG_AUTH_SHA1: sha1ctx = xd->amx_sha1_ictx; SHA1Update(&sha1ctx, (unsigned char *) &ipo, sizeof(struct ip)); break; } /* Options */ if ((ip->ip_hl << 2 > sizeof(struct ip))) for (off = sizeof(struct ip); off < (ip->ip_hl << 2);) { optval = ((u_int8_t *) ip)[off]; switch (optval) { case IPOPT_EOL: switch (xd->amx_hash_algorithm) { case ALG_AUTH_MD5: MD5Update(&md5ctx, ipseczeroes, 1); break; case ALG_AUTH_SHA1: SHA1Update(&sha1ctx, ipseczeroes, 1); break; } off = ip->ip_hl << 2; break; case IPOPT_NOP: switch (xd->amx_hash_algorithm) { case ALG_AUTH_MD5: MD5Update(&md5ctx, ipseczeroes, 1); break; case ALG_AUTH_SHA1: SHA1Update(&sha1ctx, ipseczeroes, 1); break; } off++; break; case IPOPT_SECURITY: case 133: case 134: optval = ((u_int8_t *) ip)[off + 1]; switch (xd->amx_hash_algorithm) { case ALG_AUTH_MD5: MD5Update(&md5ctx, (u_int8_t *) ip + off, optval); break; case ALG_AUTH_SHA1: SHA1Update(&sha1ctx, (u_int8_t *) ip + off, optval); break; } off += optval; break; default: optval = ((u_int8_t *) ip)[off + 1]; switch (xd->amx_hash_algorithm) { case ALG_AUTH_MD5: MD5Update(&md5ctx, ipseczeroes, optval); break; case ALG_AUTH_SHA1: SHA1Update(&sha1ctx, ipseczeroes, optval); break; } off += optval; break; } } switch (xd->amx_hash_algorithm) { case ALG_AUTH_MD5: MD5Update(&md5ctx, (unsigned char *) ah, AH_NEW_FLENGTH - AH_HMAC_HASHLEN); MD5Update(&md5ctx, ipseczeroes, AH_HMAC_HASHLEN); break; case ALG_AUTH_SHA1: SHA1Update(&sha1ctx, (unsigned char *) ah, AH_NEW_FLENGTH - AH_HMAC_HASHLEN); SHA1Update(&sha1ctx, ipseczeroes, AH_HMAC_HASHLEN); break; } /* * Code shamelessly stolen from m_copydata */ off = ohlen; len = m->m_pkthdr.len - off; m0 = m; while (off > 0) { if (m0 == 0) panic("ah_new_input(): m_copydata (off)"); if (off < m0->m_len) break; off -= m0->m_len; m0 = m0->m_next; } while (len > 0) { if (m0 == 0) panic("ah_new_input(): m_copydata (copy)"); count = min(m0->m_len - off, len); switch (xd->amx_hash_algorithm) { case ALG_AUTH_MD5: MD5Update(&md5ctx, mtod(m0, unsigned char *) + off, count); break; case ALG_AUTH_SHA1: SHA1Update(&sha1ctx, mtod(m0, unsigned char *) + off, count); break; } len -= count; off = 0; m0 = m0->m_next; } switch (xd->amx_hash_algorithm) { case ALG_AUTH_MD5: MD5Final((unsigned char *) (aho->ah_data), &md5ctx); md5ctx = xd->amx_md5_octx; MD5Update(&md5ctx, (unsigned char *) (aho->ah_data), AH_MD5_ALEN); MD5Final((unsigned char *) (aho->ah_data), &md5ctx); break; case ALG_AUTH_SHA1: SHA1Final((unsigned char *) (aho->ah_data), &sha1ctx); sha1ctx = xd->amx_sha1_octx; SHA1Update(&sha1ctx, (unsigned char *) (aho->ah_data), AH_SHA1_ALEN); SHA1Final((unsigned char *) (aho->ah_data), &sha1ctx); break; } if (bcmp(aho->ah_data, ah->ah_data, AH_HMAC_HASHLEN)) { log(LOG_ALERT, "ah_new_input(): authentication failed for packet from %x to %x, spi %08x", ip->ip_src, ip->ip_dst, ntohl(ah->ah_spi)); ahstat.ahs_badauth++; m_freem(m); return NULL; } ipo = *ip; ipo.ip_p = ah->ah_nh; /* Save options */ m_copydata(m, sizeof(struct ip), (ip->ip_hl << 2) - sizeof(struct ip), (caddr_t) buffer); m->m_len -= AH_NEW_FLENGTH; m->m_data += AH_NEW_FLENGTH; m->m_pkthdr.len -= AH_NEW_FLENGTH; m->m_pkthdr.rcvif = rcvif; /* this should not be necessary */ ip = mtod(m, struct ip *); *ip = ipo; ip->ip_len = htons(ip->ip_len - AH_NEW_FLENGTH + (ip->ip_hl << 2)); HTONS(ip->ip_id); HTONS(ip->ip_off); ip->ip_sum = 0; /* Copy the options back */ m_copyback(m, sizeof(struct ip), (ip->ip_hl << 2) - sizeof(struct ip), (caddr_t) buffer); ip->ip_sum = in_cksum(m, (ip->ip_hl << 2)); /* Update the counters */ tdb->tdb_cur_packets++; tdb->tdb_cur_bytes += ntohs(ip->ip_len) - (ip->ip_hl << 2); ahstat.ahs_ibytes += ntohs(ip->ip_len) - (ip->ip_hl << 2); /* Notify on expiration */ if (tdb->tdb_flags & TDBF_SOFT_PACKETS) if (tdb->tdb_cur_packets >= tdb->tdb_soft_packets) { encap_sendnotify(NOTIFY_SOFT_EXPIRE, tdb); tdb->tdb_flags &= ~TDBF_SOFT_PACKETS; } else if (tdb->tdb_flags & TDBF_SOFT_BYTES) if (tdb->tdb_cur_bytes >= tdb->tdb_soft_bytes) { encap_sendnotify(NOTIFY_SOFT_EXPIRE, tdb); tdb->tdb_flags &= ~TDBF_SOFT_BYTES; } if (tdb->tdb_flags & TDBF_PACKETS) if (tdb->tdb_cur_packets >= tdb->tdb_exp_packets) { encap_sendnotify(NOTIFY_HARD_EXPIRE, tdb); tdb_delete(tdb, 0); } else if (tdb->tdb_flags & TDBF_BYTES) if (tdb->tdb_cur_bytes >= tdb->tdb_exp_bytes) { encap_sendnotify(NOTIFY_HARD_EXPIRE, tdb); tdb_delete(tdb, 0); } return m; } int ah_new_output(struct mbuf *m, struct sockaddr_encap *gw, struct tdb *tdb, struct mbuf **mp) { struct ah_new_xdata *xd; struct ip *ip, ipo; struct ah_new aho, *ah; register int len, off, count; register struct mbuf *m0; MD5_CTX md5ctx; SHA1_CTX sha1ctx; int ilen, ohlen; u_int8_t optval; u_char buffer[AH_ALEN_MAX], opts[40]; ahstat.ahs_output++; m = m_pullup(m, sizeof(struct ip)); if (m == NULL) { #ifdef ENCDEBUG if (encdebug) printf("ah_new_output(): m_pullup() failed, SA %x/%08x\n", tdb->tdb_dst, ntohl(tdb->tdb_spi)); #endif /* ENCDEBUG */ return ENOBUFS; } ip = mtod(m, struct ip *); xd = (struct ah_new_xdata *) tdb->tdb_xdata; if ((ip->ip_hl << 2) > sizeof(struct ip)) { if ((m = m_pullup(m, ip->ip_hl << 2)) == NULL) { #ifdef ENCDEBUG if (encdebug) printf("ah_new_output(): m_pullup() failed, SA &x/%08x\n", tdb->tdb_dst, ntohl(tdb->tdb_spi)); #endif /* ENCDEBUG */ ahstat.ahs_hdrops++; return NULL; } ip = mtod(m, struct ip *); } /* Save options */ m_copydata(m, sizeof(struct ip), (ip->ip_hl << 2) - sizeof(struct ip), (caddr_t) opts); switch (xd->amx_hash_algorithm) { case ALG_AUTH_MD5: case ALG_AUTH_SHA1: #ifdef ENCDEBUG if (encdebug) printf("ah_new_output(): using hash algorithm %d\n", xd->amx_hash_algorithm); #endif /* ENCDEBUG */ break; default: log(LOG_ALERT, "ah_new_output(): unsupported algorithm %d in SA %x/%08x", xd->amx_hash_algorithm, tdb->tdb_dst, ntohl(tdb->tdb_spi)); m_freem(m); return NULL; } ilen = ntohs(ip->ip_len); ohlen = AH_NEW_FLENGTH; ipo.ip_v = IPVERSION; ipo.ip_hl = ip->ip_hl; ipo.ip_tos = 0; ipo.ip_len = htons(ohlen + ilen); ipo.ip_id = ip->ip_id; ipo.ip_off = htons(ntohs(ip->ip_off) & IP_DF); ipo.ip_ttl = 0; ipo.ip_p = IPPROTO_AH; ipo.ip_sum = 0; ipo.ip_src = ip->ip_src; ipo.ip_dst = ip->ip_dst; bzero(&aho, sizeof(struct ah_new)); aho.ah_nh = ip->ip_p; aho.ah_hl = (AH_HMAC_HASHLEN >> 2); aho.ah_rv = 0; aho.ah_spi = tdb->tdb_spi; if (xd->amx_rpl == 0) { log(LOG_ALERT, "ah_new_output(): SA %x/%0x8 should have expired", tdb->tdb_dst, ntohl(tdb->tdb_spi)); m_freem(m); ahstat.ahs_wrap++; return NULL; } aho.ah_rpl = htonl(xd->amx_rpl++); switch (xd->amx_hash_algorithm) { case ALG_AUTH_MD5: md5ctx = xd->amx_md5_ictx; MD5Update(&md5ctx, (unsigned char *) &ipo, sizeof(struct ip)); break; case ALG_AUTH_SHA1: sha1ctx = xd->amx_sha1_ictx; SHA1Update(&sha1ctx, (unsigned char *) &ipo, sizeof(struct ip)); break; } /* Options */ if ((ip->ip_hl << 2) > sizeof(struct ip)) for (off = sizeof(struct ip); off < (ip->ip_hl << 2);) { optval = ((u_int8_t *) ip)[off]; switch (optval) { case IPOPT_EOL: switch (xd->amx_hash_algorithm) { case ALG_AUTH_MD5: MD5Update(&md5ctx, ipseczeroes, 1); break; case ALG_AUTH_SHA1: SHA1Update(&sha1ctx, ipseczeroes, 1); break; } off = ip->ip_hl << 2; break; case IPOPT_NOP: switch (xd->amx_hash_algorithm) { case ALG_AUTH_MD5: MD5Update(&md5ctx, ipseczeroes, 1); break; case ALG_AUTH_SHA1: SHA1Update(&sha1ctx, ipseczeroes, 1); break; } off++; break; case IPOPT_SECURITY: case 133: case 134: optval = ((u_int8_t *) ip)[off + 1]; switch (xd->amx_hash_algorithm) { case ALG_AUTH_MD5: MD5Update(&md5ctx, (u_int8_t *) ip + off, optval); break; case ALG_AUTH_SHA1: SHA1Update(&sha1ctx, (u_int8_t *) ip + off, optval); break; } off += optval; break; default: optval = ((u_int8_t *) ip)[off + 1]; switch (xd->amx_hash_algorithm) { case ALG_AUTH_MD5: MD5Update(&md5ctx, ipseczeroes, optval); break; case ALG_AUTH_SHA1: SHA1Update(&sha1ctx, ipseczeroes, optval); break; } off += optval; break; } } switch (xd->amx_hash_algorithm) { case ALG_AUTH_MD5: MD5Update(&md5ctx, (unsigned char *) &aho, AH_NEW_FLENGTH); break; case ALG_AUTH_SHA1: SHA1Update(&sha1ctx, (unsigned char *) &aho, AH_NEW_FLENGTH); break; } off = ip->ip_hl << 2; /* * Code shamelessly stolen from m_copydata */ len = m->m_pkthdr.len - off; m0 = m; while (len > 0) { if (m0 == 0) panic("ah_new_output(): m_copydata"); count = min(m0->m_len - off, len); switch (xd->amx_hash_algorithm) { case ALG_AUTH_MD5: MD5Update(&md5ctx, mtod(m0, unsigned char *) + off, count); break; case ALG_AUTH_SHA1: SHA1Update(&sha1ctx, mtod(m0, unsigned char *) + off, count); break; } len -= count; off = 0; m0 = m0->m_next; } ipo.ip_tos = ip->ip_tos; ipo.ip_id = ip->ip_id; ipo.ip_off = ip->ip_off; ipo.ip_ttl = ip->ip_ttl; /* ipo.ip_len = ntohs(ipo.ip_len); */ M_PREPEND(m, ohlen, M_DONTWAIT); if (m == NULL) { #ifdef ENCDEBUG if (encdebug) printf("ah_new_output(): M_PREPEND() failed for packet from %x to %x, spi %08x\n", ipo.ip_src, ipo.ip_dst, ntohl(tdb->tdb_spi)); #endif /* ENCDEBUG */ return ENOBUFS; } m = m_pullup(m, ohlen + (ipo.ip_hl << 2)); if (m == NULL) { #ifdef ENCDEBUG if (encdebug) printf("ah_new_output(): m_pullup() failed for packet from %x to %x, spi %08x\n", ipo.ip_src, ipo.ip_dst, ntohl(tdb->tdb_spi)); #endif /* ENCDEBUG */ return ENOBUFS; } ip = mtod(m, struct ip *); ah = (struct ah_new *) ((u_int8_t *) ip + (ipo.ip_hl << 2)); *ip = ipo; ah->ah_nh = aho.ah_nh; ah->ah_hl = aho.ah_hl; ah->ah_rv = aho.ah_rv; ah->ah_spi = aho.ah_spi; ah->ah_rpl = aho.ah_rpl; switch (xd->amx_hash_algorithm) { case ALG_AUTH_MD5: MD5Final(buffer, &md5ctx); md5ctx = xd->amx_md5_octx; MD5Update(&md5ctx, buffer, AH_MD5_ALEN); MD5Final(buffer, &md5ctx); break; case ALG_AUTH_SHA1: SHA1Final(buffer, &sha1ctx); sha1ctx = xd->amx_sha1_octx; SHA1Update(&sha1ctx, buffer, AH_SHA1_ALEN); SHA1Final(buffer, &sha1ctx); break; } /* Restore the options */ m_copyback(m, sizeof(struct ip), (ip->ip_hl << 2) - sizeof(struct ip), (caddr_t) opts); /* Copy the authenticator */ bcopy(buffer, ah->ah_data, AH_HMAC_HASHLEN); *mp = m; /* Update the counters */ tdb->tdb_cur_packets++; tdb->tdb_cur_bytes += ntohs(ip->ip_len) - (ip->ip_hl << 2) - AH_NEW_FLENGTH; ahstat.ahs_obytes += ntohs(ip->ip_len) - (ip->ip_hl << 2) - AH_NEW_FLENGTH; /* Notify on expiration */ if (tdb->tdb_flags & TDBF_SOFT_PACKETS) if (tdb->tdb_cur_packets >= tdb->tdb_soft_packets) { encap_sendnotify(NOTIFY_SOFT_EXPIRE, tdb); tdb->tdb_flags &= ~TDBF_SOFT_PACKETS; } else if (tdb->tdb_flags & TDBF_SOFT_BYTES) if (tdb->tdb_cur_bytes >= tdb->tdb_soft_bytes) { encap_sendnotify(NOTIFY_SOFT_EXPIRE, tdb); tdb->tdb_flags &= ~TDBF_SOFT_BYTES; } if (tdb->tdb_flags & TDBF_PACKETS) if (tdb->tdb_cur_packets >= tdb->tdb_exp_packets) { encap_sendnotify(NOTIFY_HARD_EXPIRE, tdb); tdb_delete(tdb, 0); } else if (tdb->tdb_flags & TDBF_BYTES) if (tdb->tdb_cur_bytes >= tdb->tdb_exp_bytes) { encap_sendnotify(NOTIFY_HARD_EXPIRE, tdb); tdb_delete(tdb, 0); } return 0; }